Home · About · A-Z Index · Search · Contacts · Press · Register · Login
    


Objective of Meeting
Summary
Outputs
Next Steps
Links

Sponsoring Forum(s):

Security


Meeting Report

Managers Guides to Information Security

Cannes, France - Thursday, October 17 2002

Objective of Meeting

Review progress on 4 projects involving Managers Guides:

  • Guide to Data Privacy - final review of the draft document & arrangements for formal review to approve for publication.
  • Guide to PKI & Related Technologies - review of existing draft and gathering of final inputs for completion for formal review to approve for publication.
  • Review of Digital Rights Management white paper and discussion on what aspects of the DRM problem space we should issues to pursue.
  • Review of action on guides to Secure Email based on the Secure Messaging Challenge Toolkit

Summary

Managers Guide to Data Privacy

The lead editor Eliot Solomon gave a walk-through on the latest draft of this guide. After discussion on detailed editing issues, we noted that the first part of the book is in good shape, but the latter part needs additional description for the headings/topics we want to cover. There is also some cleaning-up to do of duplicated description. When this is done the guide will be complete. Steve Jenkins and Eliot offered to do this authoring work. Their offer was accepted and they will be credited with Jacques Francoeur and Bob Blakley as joint authors.

Guide to PKI & Related Technologies

Eliot Solomon felt this guide no longer has the value it had 6 months ago and suggested we re-evaluate what we want to achieve with the material that the present draft contains. Ian Dobson confirmed that since making the current draft available to the Directory Interoperability Forum and Messaging Forum, no comments or expressions of interest have been received from members. Nevertheless, Ian thought that nothing has happened to improve understanding of PKI technology and its surrounding security issues over the past 6 months, and from his understanding of the non-USA market - particularly Europe - there is still a significant need to explain to business Managers what they can expect from Public Key solutions, and to describe to them how they might use any existing PK software they may already have bought but are confused as to how to make use of.

Eliot thought we would be better advised to think in terms of writing a Managers Guide to IT Security for the Enterprise. Other suggestions included that we could target whatever guide we do produce in this space more along the lines of how the MGIS introduces the Public Key issues - Know Who's Who, etc. Other members proposed to review the existing draft more closely to input their feedback. Whatever our decision, this PKI guide will not receive attention from the editing team until they complete the final draft of the Privacy Guide for member review.

Digital Rights Management

Craig Heath has released his DRM Backgrounder paper, which is now available from The Open Group Web site at www.opengroup.org/projects/sec-guides.

Craig noted from the Security Design Patterns workshop held on Wednesday afternoon that we have concluded that playback devices do need a guard. He drew a putative architecture for a DRM system and described the key points it represents. The representation of his system architecture makes an assumption that the DRM Agent has 3 points of contact with the outside world:

  • protocols & formats
  • hardware abstraction
  • application hooks to properly authorized consumers

In detailed discussion, it was noted that Craig's protected secret store needs to be both tamper-resistant and secret. An authorization API is not the solution that this problem needs. Craig explained that some 10-12 items have been identified as needing to be protected in this DRM context, so a common way to provide that protection would seem to be a
good thing. The Open Mobile Alliance (OMA) have DRM requirements but these are not publicly available at this time, and we also know that Motorola were interested in solutions to DRM requirements though these are not yet clear.

Guide to Secure Email

Following on from the discussion and actions agreed in our previous conference in Boston (22-26 July), we have discussed with Secure Messaging Forum members how we should move forward to use the advice & policy & practices parts of their Secure Messaging Challenge Toolkit document as the basis for a Managers Guide to Implementing Secure Email. Since our joint discussion in the Boston meeting, the Security Forum has shifted its approach from proposing to include secure email as part of our Working with PKI guide; we now think it could be a separate guide in its own right.

Russ Chung had volunteered to be the point of contact in the Messaging Forum for working on this topic. He joined the Cannes meeting by telephone. Ian Dobson thanked him for doing so at 6am Los Angeles time. Russ noted that The Open Group has now published the Secure Messaging Challenge Toolkit in paper form. 80% of the toolkit is screenshots and the details of setting up the environment, and about 20% is discussion on policy and practices. The toolkit is a cookbook on what the implementor needs to do the set up a secure email system.

In discussion, it was suggested that we should include in our Secure Email guide a description of the Secure Messaging Challenge and what it signified, and say that if the reader wants to know more then they should read the toolkit document. Some discussion ensued on what the Secure Messaging Challenge project had achieved in demonstrating - secure exchange of keys and secure messages - and what further challenges would be useful in taking it further, e.g. digital signing, timestamping, revocation of keys. However, for the purposes of this Secure Email guide, we agreed that our aim should be to develop an operating guide for what has already been achieved.

Russ volunteered that as a first step he will prepare an outline structure for this Secure Email guide, from the available information that is in the published Secure Messaging Challenge Tooolkit document, peeling away the implementation-specific material. He will send this to Ian for circulation to the Security Forum and Messaging Forum membership, requesting feedback for guidance on what the Secure Email guide should cover. Based on this feedback, Russ will produce a first draft of the text by the next (San Francisco) meeting.

Outputs

Guide to Data Privacy
Agreement on how to complete editing of the Guide by 28 November 2002

Guide to PKI & Related Technologies
Review purpose of this Guide, and prompt members to review existing draft and return comments.

Digital Rights Management
The discussion concluded that while there are known business requirements in this DRM space, we are unable at this time to express them clearly enough to be able to move it forward

Guide to Secure Email
Agreement on how to generate an initial draft for review at the next meeting.

Next Steps

Guide to Data Privacy
Eliot Solomon and Steve Jenkins undertook to complete this Guide by end of November 2002. It will then be made available for a 2-week formal review before being released for publication.

Guide to PKI & Related Technologies
Question as to whether this 2002 deliverable now has sufficient value to justify completing it. Ian Dobson will prompt all members (including in the DIF and Messaging Forums) to request they review the existing publicly available draft PKI Guide and return comments on what additional issues it might address and what further material it might include. In any event, resources to take it forward will not be available until December (after completion of the Privacy Guide) so even if we proceed, it will not now be delivered in 2002.

Digital Rights Management
Ian Dobson will check what liaisons The Open Group may have in place with the Open Mobile Alliance (OMA) to see if we might be able to access their members-only requirements work on DRM issues.

Guide to Secure Email
Russ Chung will prepare an outline structure for review, and based on feedback he will produce a first draft for review at the next (San Francisco) meeting.

Links

Refer to the interactive Web page for Security Guides - www.opengroup.org/projects/sec-guides/


Home · Contacts · Legal · Copyright · Members · News
© The Open Group 1995-2012  Updated on Wednesday, 23 October 2002